1. Kali Linux
2. nmap
3. Metasploit
4. Wireshark
5. John the Ripper
6. Hydra
7. Burp Suite
8. Zed Attack Proxy
9. sqlmap
10. aircrack-ng
Reference:
https://www.csoonline.com/article/2943524/17-penetration-testing-tools-the-pros-use.html#tk.rss_all
No comments:
Post a Comment